Get the latest tech news

Reconstructing Public Keys from Signatures


One weird hobby of mine is reasonable properties of cryptographic schemes that nobody promised they do or don’t have. Whether that’s invisible salamanders or binding through shared secr…

Whether that’s invisible salamanders or binding through shared secrets, anything that isn’t just boring IND-CCA2 or existential unforgeability is just delightful material to construct vulnerabilities with. You only need relatively little extra information to recover though, and it is possible that some timing attacks on the verifying logic would suffice to pick back up and continue along the Merkle tree. It again could use its own blog post, but here it is, slightly condensed and leaving out such unnecessary details as what the private key is and how anyone actually computes a valid signature in the first place.

Get the Android app

Or read this on Hacker News

Read more on:

Photo of signatures

signatures

Photo of Public Keys

Public Keys

Related news:

News photo

After e-signatures, Tomorro believes e-contracts will be the next big thing